Blogs promoting Blogs

November 6, 2013

This has been an interesting little experiment in social media, the quality of the press, and far most importantly the quality of scientific method and accountability or verification or the lack of it by the loudest voices in the most important debate of our time: How do we balance the constitutional demand between Privacy and Security? There are screeds but very little scientific analysis or demonstration of scientific capabilities.

Effective change will only happen with those willing to broaden the converstion so it is balanced (just as we need to balance Privacy and Security.) And there are two components needed for this debate: workable technology and considered legislation that is reacting to the broad section of democratic arguments. A balanced debate is not comprised of fractional groups with access to the Internet and a silenced majority. The most effective path would be for journalists and scientists to follow the science and see how it has been practiced and validate it or demonstrate something and disprove it. But that is harder than writing.

What we haven't seen yet from the anticipated first responses is any credible academic institutions, computer scientists, governments or labs concerned enough about the woeful state our our security posture to actually question scientific method performed in the past or interested in evaluating science before them and asking meaningful questions. Materials are freely available for fair, unbiased testing. It is a simple task to test and verify independently the results already published by scientific institutions in labs in properly controlled environments that already have done the hard work. And strong science, properly practiced is replicable and verifiable.

http://wnlabs.com/pdf/Wagner_Security_Analysis.pdf

http://wnlabs.com/downloads/UVIC_Performance_Analysis.pdf

We certainly haven't seen any of the blogging world capable of taking the challenge put before them.

http://wnlabs.com/news/challengeDEFCON.php

That reality stands on its own. The rest is white noise. http://wnlabs.com/technology/Whitenoise_Overview.php

--

On October 31, 2013 SlashDot editors acknowledged receiving a submitted article for publication.

http://slashdot.org/submission/3086201/public-questions-schneier-snowden-and-nsa

Slashdot

Thank you for publishing a different point of view and leaving it posted.

---

 

 

This is where the most important debate of our time is led from.

Blogs link cross promoting one point of view.

http://www.techdirt.com/articles/20131031/15234825094/bruce-schneier-speculates-nsa-double-laundering-information-it-obtains-via-network-infiltration.shtml

http://www.techdirt.com/articles/20131031/15234825094/bruce-schneier-speculates-nsa-double-laundering-information-it-obtains-via-network-infiltration.shtml

Bruce Schneier   Speculates On NSA Double Laundering Information   ...

http://www.circleid.com/posts/20131031_bruce_schneier_to_speak_about_internet_surveillance_at_ietf_88

http://www.circleid.com/posts/20131031_bruce_schneier_to_speak_about_internet_surveillance_at_ietf_88/

http://radar.oreilly.com/2013/10/four-short-links-31-october-2013.html

http://inagist.com/all/395992129563947008/

http://www.youtube.com/watch?v=N-YjMISwS2w&list=PL9fPq3eQfaaDcbIEMSzdL5yuzh_m6BB-E&index=15

https://www.facebook.com/bruce.schneier/posts/10151814163523025

https://www.facebook.com/bruce.schneier/posts/10151791481068025

https://www.facebook.com/bruce.schneier/posts/10151917166520867

https://www.facebook.com/bruce.schneier/posts/10151792208918025

https://www.facebook.com/bruce.schneier/posts/10151787576653025

https://www.facebook.com/bruce.schneier/posts/10151792208918025

https://www.facebook.com/bruce.schneier/posts/10151815483343025

https://www.facebook.com/bruce.schneier/posts/10151819506068025

https://www.facebook.com/bruce.schneier/posts/10151917837340867

http://www.techmeme.com/131027/p12#a131027p12

https://teksyndicate.com/videos/stop-watching-us-rally-interviews-

http://zweihander.bandcamp.com/

https://www.districtlines.com/epic-pants

http://inagist.com/all/394641126801420289/?utm_source=inagist&utm_medium=rss

https://ociusaps.wordpress.com/2013/10/28/bruce-schneier-the-nsa-and-your-business-secrets/

http://www.nowpublic.com/world/stop-watching-us-rally-interviews-bruce-schneier-thomas-drake

http://www.nowpublic.com/world/stop-watching-us-rally-interviews-bruce-schneier-thomas-drake

http://www.techdirt.com/articles/20131025/08383625015/bruce-schneier-feudal-internet-how-to-fight-it.shtml

http://www.techdirt.com/articles/20131025/08383625015/bruce-schneier-feudal-internet-how-to-fight-it.shtml

http://inagist.com/all/393927055705796608/?utm_source=inagist&utm_medium=rss

http://www.news.nom.co/bruce-schneier-on-the-feudal-internet-6809990-news/

http://stateofglobe.com/2013/10/26/bruce-schneier-on-the-feudal-internet-and-how-to-fight-it/?utm_source=rss&utm_medium=rss&utm_campaign=bruce-schneier-on-the-feudal-internet-and-how-to-fight-it

http://arstechnica.com/security/2013/10/dear-av-provider-do-you-enable-nsa-spying-yours-eff/

http://connecttheworld.blogs.cnn.com/tag/bruce-schneier/

http://www.occupy.com/tags/bruce-schneier

http://www.occupy.com/tags/bruce-schneier%3Chttps://www.google.com/url?q=http://www.occupy.com/tags/bruce-schneier&ct=ga&cd=MTEzNzM0MjI1NTYzNjQ4MjQzMDA&cad=CAEYAA&usg=AFQjCNHdNsDkYt4D232c2vBNORZdUyx60g

http://privacy-pc.com/interviews/bruce-schneier-on-the-matthew-filipowicz-show-2-obstacles-to-restoring-trust-for-the-nsa.html

http://inagist.com/all/393396035604590592/

https://twitter.com/mikko/statuses/392722077829967872

https://www.schneier.com/blog/archives/2013/10/code_names_for.html

http://www.goodreads.com/author_blog_posts/5087355-can-i-be-trusted

https://www.facebook.com/hnbot/posts/576084625780156

https://www.facebook.com/hnbot/posts/576084625780156%3Chttps://www.google.com/url?q=https://www.facebook.com/hnbot/posts/576084625780156&ct=ga&cd=MTE1MzcyODgyMTUwNTc2MjQxMTc&cad=CAEYAw&usg=AFQjCNHsxFCvayfP9-OTBZlTzZZmIeTv3w

https://www.schneier.com/blog/archives/2013/10/can_i_be_truste.html?utm_source=twitterfeed&utm_medium=twitter

https://twitter.com/mikko/statuses/392722077829967872

https://www.schneier.com/blog/archives/2013/10/code_names_for.html

http://www.goodreads.com/author_blog_posts/5087355-can-i-be-trusted

https://www.facebook.com/hnbot/posts/576084625780156

https://www.facebook.com/hnbot/posts/576084625780156

https://www.schneier.com/blog/archives/2013/10/can_i_be_truste.html?utm_source=twitterfeed&utm_medium=twitter

http://afflictor.com/tag/bruce-schneier/

http://www.tvballa.com/2013/10/bruce-schneier/qotd-bruce-schneier

http://www.tvballa.com/2013/10/bruce-schneier/qotd-bruce-schneier

http://privacy-pc.com/interviews/bruce-schneier-on-the-matthew-filipowicz-show-nsa-working-with-tech-companies-to-insert-weaknesses-into-code.html

http://privacy-pc.com/interviews/bruce-schneier-on-the-matthew-filipowicz-show-nsa-working-with-tech-companies-to-insert-weaknesses-into-code.html

http://privacy-pc.com/interviews/bruce-schneier-on-the-matthew-filipowicz-show-nsa-working-with-tech-companies-to-insert-weaknesses-into-code.html

http://conservatives4palin.com/2013/10/bruce-schneier-your-life-under-constant-surveillance.html

http://dailyme.com/story/2013102100002127/nsa-surveillance-the-21st-century-panopticon-bruce-schneier

http://dailyme.com/story/2013102100002127/nsa-surveillance-the-21st-century-panopticon-bruce-schneier

http://privacy-pc.com/interviews/bruce-schneier-on-the-nsas-surveillance-5-possible-backlash-of-ubiquitous-spying.html

http://inagist.com/all/390824345083207680/

http://inagist.com/all/390824345083207680/

http://inagist.com/all/390824345083207680/

http://inagist.com/all/390820409966604288/

http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/

http://www.wired.com/opinion/2013/10/how-to-design-and-defend-against-the-perfect-backdoor/

http://www.technewsworld.com/story/79203.html

http://www.opb.org/news/article/npr-are-we-moving-to-a-world-with-more-online-surveillance/

http://jhaines6.wordpress.com/tag/bruce-schneier/

http://www.goodreads.com/author_blog_posts/5049770-nsa-harvesting-contact-lists

https://bitcointalk.org/index.php?topic=310767.0

http://www.globalservices.bt.com/uk/en/insights/how_to_keep_your_data_safe

http://www.siliconvalleywatcher.com/mt/archives/2006/10/bt_buys_schneie.php

http://www.ecommercetimes.com/story/53892.html

http://www.youtube.com/watch?v=SOM2E2Tny-Q

http://www.theregister.co.uk/2013/10/11/nsa_exploit_methodology/?utm_content=buffer09ec6&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer

http://boingboing.net/2013/10/11/howto-maintain-an-air-gapped-s.html

https://www.schneier.com/blog/archives/2013/10/air_gaps.html

http://socialawareness2013.wordpress.com/2013/10/11/bruce-schneier-nsa-has-gotten-out-of-control/

http://4x.reddit.com/r/snowden/comments/1o79qb/bruce_schneier_nsa_has_gotten_out_of_control/

http://www.psfk.com/2013/10/effective-meeting-tips.html

http://www.newsbooze.com/2013/10/the-nsa-has-gotten-out-of-control-bruce.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+RonPaulBlog+(RON+PAUL+BLOG)

http://privacy-pc.com/interviews/bruce-schneier-on-the-nsas-surveillance-2-eavesdropping-on-everything.html

http://tehranchronicle.com/tor-users-being-tracked-by-nsa-through-google-ads/3419/

http://arstechnica.com/security/2013/10/nsa-saves-zero-day-exploits-for-high-value-targets/

http://siliconangle.com/blog/2013/10/09/how-nsa-tries-to-break-into-computers-using-tor/?angle=silicon

http://podcasts.infoworld.com/d/security/your-security-vendor-colluding-the-nsa-228353?source=rss_infoworld_top_stories_

https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

http://www.24tanzania.com/tag/bruce-schneier/

http://www.newsana.com/big-ideas/story/watchv-h0d-qdgl3gi

http://blog.cedricbonhomme.org/2013/10/04/ted-de-bruce-schneier-the-battle-for-power-on-the-internet/

http://boingboing.net/2013/10/04/bruce-schneier-how-to-make-th.html

http://www.memeorandum.com/131004/p82#a131004p82

http://www.techmeme.com/131004/p37#a131004p37

http://vimeo.com/76165619

http://inagist.com/all/386328477281968130/

http://whatreallyhappened.com/content/attacking-tor-how-nsa-targets-users-online-anonymity-bruce-schneier

http://inagist.com/all/386334437832523778/?utm_source=inagist&utm_medium=rss

http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption

http://www.youtube.com/watch?v=1ZnKcDnapuY

http://whatreallyhappened.com/content/attacking-tor-how-nsa-targets-users-online-anonymity-bruce-schneier

http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption

https://twitter.com/WeSecureNL

http://www.youtube.com/watch?v=1ZnKcDnapuY

http://www.youtube.com/watch?v=1ZnKcDnapuY

http://europesworld.org/author/bruce-schneier/

https://www.facebook.com/bruce.schneier/posts/10151771599038025

https://www.facebook.com/bruce.schneier/posts/10151772994903025

http://filesamba.net/search.php?q=bruce+schneier+schneier+on+security

http://boingboing.net/2013/09/28/difi-admits-that-the-nsa-is-wi.html

http://www.goodreads.com/author_blog_posts/4943915-another-schneier-interview

http://www.goodreads.com/author_blog_posts/4943914-friday-squid-blogging-a-squid-that-fishes

http://www.truthdig.com/tag/bruce_schneier

http://www.truthdig.com/tag/bruce_schneier

http://www.youtube.com/watch?v=WpPqFo0DViw

http://anonymoustruthblog.com/slide-view/another-hero-worth-mentioning-bruce-schneier/

http://inagist.com/all/383047585683877888/

http://www.darkreading.com/sophoslabs-insights/the-new-kiss-rule-keep-information-secur/240161794

http://www.businessinsider.com/bruce-schneier-on-the-nsa-2013-9

http://www.youtube.com/watch?v=h0d_QDgl3gI&feature=youtube_gdata

http://inagist.com/all/382611908181753856/

http://ww3.tvo.org/video/195406/bruce-schneier-trust-and-surveillance-state

http://www.businessinsider.com/bruce-schneier-on-the-nsa-2013-9

https://news.google.com/news/story?ncl=http://www.businessinsider.com/bruce-schneier-on-the-nsa-2013-9&hl=en&geo=US

http://t3.gstatic.com/images?q=tbn:ANd9GcT1TNbv--HaqSY-B5yzFxqwuNiWclmlhAy1eADz3WljCQ2pZRnjbrY64Zu2

http://inagist.com/all/382391755355594752/?utm_source=inagist&utm_medium=rss

http://consciouslifenews.com/bruce-schneier-nsa-spying-making-safe/1165794/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+ConsciousLifeNews+(Conscious+Life+News)

http://www.democraticunderground.com/10023723940

http://skullfiles.com/search.php?q=bruce+schneier+schneier+on+security

https://twitter.com/techreview/status/382391755355594752

http://dailyme.com/story/2013092400003360/bruce-schneier-on-the-nsa

http://www.onenewspage.us/n/Technology/74w12wu7e/Security-Expert-Bruce-Schneier-The-NSA-Spying.htm

http://www.onenewspage.us/.../Security-Expert-Bruce-Schneier-The-...%3Chttp://www.google.com/url?q=http://www.onenewspage.us/n/Technology/74w12wu7e/Security-Expert-Bruce-Schneier-The-NSA-Spying.htm&ct=ga&cd=MTcwMzkwNDUyNTcxMTM0MTI1MTM&cad=CAEYBw&usg=AFQjCNHOmj7ruUlXtG5KykWyKLJZh9j6PQ

http://www.topix.com/com/widevine-technologies

http://www.topix.com/.../security-expert-bruce-schneier-the-nsas-spy...%3Chttp://www.google.com/url?q=http://www.topix.com/com/widevine-technologies/2013/09/security-expert-bruce-schneier-the-nsas-spying-program-is-like&ct=ga&cd=MTcwMzkwNDUyNTcxMTM0MTI1MTM&cad=CAEYCA&usg=AFQjCNGm0ljNRRZ2TICV-Rq5_yTn7Us2Pw

http://cacm.acm.org/opinion/interviews/168030-bruce-schneier-nsa-spying-is-making-us-less-safe/fulltext

http://talkrational.org/showthread.php?p=2204395

http://in.finance.yahoo.com/news/security-expert-bruce-schneier-nsas-144803897.html

http://www.technologyreview.com/news/519336/bruce-schneier-nsa-spying-is-making-us-less-safe/

http://dewaynenet.wordpress.com/2013/09/23/bruce-schneier-nsa-spying-is-making-us-less-safe/

http://m.technologyreview.com/news/519336/bruce-schneier-nsa-spying-is-making-us-less-safe/

http://inagist.com/all/382020826662322176/?utm_source=inagist&utm_medium=rss

http://www.techinvestornews.com/Enterprise/Latest-Enterprise-News/bruce-schneier-nsa-spying-is-making-us-less-safe

https://www.facebook.com/hnbot/posts/562452210476731

http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332190/

http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332190/

http://www.marketwatch.com/story/akamai-to-gather-business-and-technology-leaders-at-sixth-annual-customer-conference-2013-09-19

http://www.pcworld.com/article/2048944/security-researchers-can-sneak-undetectable-trojans-into-intels-ivy-bridge-chips.html

https://www.facebook.com/bruce.schneier/posts/10151742967223025

http://www.mafiarls.com/621376-bruce-schneier-schneier-on-security.html

http://www.usnews.com/opinion/blogs/world-report/2013/09/18/internet-surveillance-is-a-necessary-part-of-national-security

http://www.techmeme.com/130917/p10?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SmithMarketwatchIndustryNews+(Smith+MarketWatch+Industry+News)

http://matthewf.net/

http://www.reddit.com/r/netsec/comments/1mfoow/how_companies_can_protect_against_leakers_bruce/

http://www.reddit.com/r/technology/comments/1mfk2m/bruce_schneier_how_to_remain_secure_against_the/

http://legalpronews.findlaw.com/article/04C76QzejU6No#.UnYGTHDUCwk